Potential problems and solutions in intranets and extranets in business
Network security is the technique of putting in place both physical and software security measures to prevent the fundamental network infrastructure of an organization from issues such as unauthorized access, malfunctioning, misuse, destruction, and modification. Network security can be increased by developing a safe platform for the computer systems, programs and users to perform appropriate activities in a safe environment (Rhodes-Ousley, 2013). The increase in usability of the intranets and extranets in businesses brings the essence for the businesses to realize the issues and solutions for intranet and extranet respectively.
An intranet is different from extranet because it provides a private network to a small number of users that have been given permission by the business to access the information services on the Internet. While the extranet is intranet that can be partly accessed by the authorized external users thus enhancing different businesses to communicate and exchange information via the internet securely. During the normal business utilization of the intranet, there are security issues encountered (Rhodes-Ousley, 2013).
Unauthorized access is one of the problems faced by many businesses in their intranets and extranets. The unauthorized access happens when the internal or external unauthorized person gains access to the business data and information stored on a business intranet. The businesses can solve unauthorized access problems by employing authentication techniques such as the use of passwords, biometrics, and smart cards. Moreover, the businesses can deploy a bastion host before users’ access to the business intranet (Stewart, 2014).
Misuse of the privileges is a problem facing businesses intranet and extranets because users often gain access to the business systems from the intranet; for example, an accounting department user may access production department system without seeking authorization from the system administrator. Another example is the user from the partnering business accessing the partner’s data or information without the knowledge of the partner permission. Misuse of the privileges can be solved by using the intranet and extranet monitoring system to monitor what the intranet and extranet users are doing on their personal computers and in the intranet (Rhodes-Ousley, 2013).
Hackers are threatening most business’ intranets and extranets. Hackers can intercept confidential business information when it is being transmitted to an authorized user. For example, users who are allowed to send and share documents between different geographical areas via the intranet or extranet can inadvertently expose confidential data to hackers (Stewart, 2014). Emails are the major cause of sensitive data exposure because they are regularly sent from one different geographical location to another. Encryption of the data transmitted can be the better solution to hacking problems. The users only can be allowed to access encrypted messages that are sent in the form of an email. The application of the SSL digital certificates can assist in securing both intranet and extranet.
Malicious contents are problematic to business communication via emails. Trojan horses, worms, and viruses are the major malicious contents causing problems to business communication because they attach themselves on the emails (Stewart, 2014). Attachment in the emails can cause sabotage in the communication because once they are opened the system can get affected completely thus disrupting the business essential information. Therefore, business intranet and extranet users are supposed to make sure they maintain and update the security programs in every personal computer and business serves on both intranet and extranet to ensure protection.
Information system management
Concepts in Information systems management
Information system management is the program that gives training and education to enhance students become the transformers and improvers of the organizational projects, designing new innovative products and services that bring efficiencies and effectiveness in business processes (Abramowicz, & Kokkinaki, 2014). The information system management can help the student reduce the gap between the users and information technology experts. The key concepts in the information system management are information systems and internet security.
An information system is a collection of software, hardware, trained employees, and infrastructure. The components of information system help in planning, controlling, coordinating and decision making (In Baglieri, 2014). From the components of the information system, it is clear that management roles in an organization can be facilitated by the information systems because they key roles or management are similar to the roles of the information system.
Operations support systems, transaction processing system, Decision support system, management information system, point of sale, process control system and management support system are some of the information systems that bring efficiency to the organizational processes (Abramowicz, & Kokkinaki, 2014). Therefore, it is significant for the institution to offer information system management course as a way of adding new skills and preparing new well-packaged human resources to the organizations in various industries worldwide. Technology is changing gradually; hence the institution should produce qualified and well-informed candidates to fit the current and future work environments as far as technology advancement is considered.
Internet security is another important concept in information system management because it is focusing on the development of actions and rules to take to provide security over the Internet (In Baglieri, 2014). One example of the internet security is the online system that protects the security cards from being stolen during shopping via websites such as Amazon. Through internet security concept students can acquire skills regarding internet safety or online safety thus improves users’ personal security and safety threats to personal property and safety related with the utilization of internet and personal protection from typical computer crimes.
Learning about internet security can help in identifying data theft. The course offers techniques for identifying data and information; for example learning about factors that lead to fraudsters getting hold of the personal information in credit card and social security number (Abramowicz, & Kokkinaki, 2014). Currently, most of the fraudsters steal credit cards information and use in fraudulent activities such as borrowing a loan and making illegal purchases without the user’s knowledge. Therefore, due to the issues surrounding internet security, it is important for the department’s suggestion to be taken into consideration. The students produced by the information system management can play an important role in reducing the rate of online security issues because they can enlighten individuals and institutions regarding measures for eliminating online fraudsters.
Information system management course will serve as the source of security knowledge thus gives the students competitive advantage in job securing because they can be helpful to the organizations and the entire society. An example of the online fraud was the reported in England regarding the Afghan war widow who received a bank stamen addressed to her past home (In Baglieri, 2014). The widow’s account was cleaned by a fraudster who faked death certificate of Eunice Lee and later applied for a credit card in Eunice’s name the make huge purchases of business supplies, clothes and camping gear before security monitors and understands that the purchases were not for a normal 91 years old woman.
Abramowicz, W., & Kokkinaki, A. (2014). Business Information Systems Workshops: BIS 2014 International Workshops, Larnaca, Cyprus, May 22-23, 2014, Revised Papers. Cham: Springer International Publishing.
In Baglieri, D. (2014). Information systems, management, organization, and control: Smart practices and effects.
Rhodes-Ousley, M. (2013). Information security: The complete reference. New York: McGraw-Hill Education.
Stewart, J. M. (2014). Network security, firewalls, and VPNs, second edition. Burlington, MA: Jones & Bartlett Learning.